banner

[Rule] Rules  [Home] Main Forum  [Portal] Portal  
[Members] Member Listing  [Statistics] Statistics  [Search] Search  [Reading Room] Reading Room 
[Register] Register  
[Login] Loginhttp  | https  ]
 
Forum Index Thông tin về các địa chỉ và tài liệu hữu ích [Ebooks] Cisco Internetworking with Windows NT & 2000  XML
  [Question]   [Ebooks] Cisco Internetworking with Windows NT & 2000 22/12/2007 23:34:50 (+0700) | #1 | 105345
[Avatar]
tmd
Member

[Minus]    0    [Plus]
Joined: 28/06/2006 03:39:48
Messages: 2951
Offline
[Profile] [PM]
http://www.paid4share.com/file/804/Cisco-Internetworking-with-Windows-NT---2000-rar.html, http://rapidshare.com/files/76938998/Cisco_Internetworking_with_Windows_NT___2000.rar http://rapidshare.com/files/76915914/cisworking.rar http://www.paid4share.com/file/950/0072120835-rar.html.

[img]http://ecx.images-amazon.com/images/I/51KY9W3WYEL._BO2,204,203,200_PIlitb-dp-500-arrow,TopRight,45,-64_OU01_AA240_SH20_.jpg[/img]

This book contains 16 chapters and 4 appendixes. The chapters are broken down into four major
sections. The first discusses Cisco and Windows convergence; the second explains the nuts and
bolts of building networks; the third focuses on managing a network once you've built it; and the
fourth outlines strategies you can use to connect others to your network.

Part I: Windows Meets the Network
The first section of this book introduces the background information you need in order to grasp how
Cisco and Microsoft are shaping your future network today. This section also gets technical,
covering the technologies that form the foundation of modern networking.

Chapter 1, "Cisco and Windows Converge"—This chapter discusses the recent news on
Microsoft's Windows 2000 and on Cisco's latest strategies. It also introduces concepts necessary to
properly understand and get the best use of the material found in this book.

Chapter 2, "Directory-Enabled Networking (DEN)"—This chapter describes the history behind
the Directory-Enabled Network initiative. It also introduces the fundamental concepts of DEN and
policy-based networking.

Chapter 3, "Networking Fundamentals"—This chapter introduces essential networking subjects,
such as the OSI model, as well as various protocols (Ethernet, Token Ring, and Fast Ethernet),
including routing protocols. These and other subjects are discussed as they relate to Cisco
hardware and software, and as they relate to Microsoft Windows 2000.


Part II: Building a Cisco Network with Windows 2000
This section covers the hands-on aspects of configuring network components using simple and
advanced software interfaces. It features a wide variety of Cisco and Microsoft tools that help make
the job easier, and includes expert tips and shortcuts.

Chapter 4, "Cisco Hardware and Internetworking Tools"—This chapter covers the wide variety
of available hardware options, including routers, switches, hubs, access servers, and firewalls, and
highlights many of their unique features and functions. It also covers the Cisco Internetwork
Operating System (IOS) in detail; and finally, it examines cables, connectors, and various
management and troubleshooting tools.

Chapter 5, "Configuring Routers and RRAS"—This chapter covers router configuration and
installation. It stresses the process of testing new equipment and testing IOS version upgrades in a
lab environment, provides a simple preconfiguration checklist that you can use, and takes you stepby-
step through the router boot process. It also covers Cisco ConfigMaker and NetSys Baseliner in
detail, as well as setting up TCP/IP on Windows machines, the Windows route table, and
Microsoft's Routing and Remote Access Service (RRAS).

Chapter 6, "Setting Up Switches and VLANs"—This chapter covers Cisco switches, including
those supporting high-performance desktop connectivity, enterprise work- group aggregation, and
dispersed building aggregation. It carefully describes Cisco's Web-based Visual Switch
Management (VSM) software, as well as the Spanning Tree Protocol (STP) and the Switched Port
Analyzer (SPAN). It also covers VLAN configuration issues, trunking, and VLAN management.

Chapter 7, "Configuring Cisco Hubs"—This chapter coversthe fundamentals of repeater
technology, Ethernet standards, and IEEE 802.3 10BaseT and 100BaseT specifications. It reviews
Cisco's FastHub Series of Class II repeaters and provides cabling specifications. This chapter also
includes scenarios in which hubs can be installed cost- effectively in the network.


Part III: Managing a Cisco/Windows Network
This section focuses on the products and methods used to manage a Cisco/Windows network. This
includes advanced Active Directory design and management strategies, Cisco device management,
and naming services for Windows NT and Windows 2000, such as DNS, WINS, and DHCP.

Chapter 8, "Managing Devices"—This chapter covers a wide variety of applications used to
manage and configure Cisco/Windows networks. This includes HP OpenView and
CiscoWorks2000, and their add-on components. It also covers tools that help manage switches,
networks (including ATM networks), and specific Cisco devices such as CiscoWorks Switched
Internetwork (CWSI), CiscoView, VLANDirector, TrafficDirector, and ATMDirector.

Chapter 9, "Managing Directory Services"—This chapter carefully delves into Windows 2000
Directory Services management. It covers the Microsoft Management Console and the various
tools that enable smoother, faster, and less-expensive management of a Windows 2000 domain.
This includes Windows 2000 multi-master replication techniques,IP Security (IPSec) configuration
in Windows 2000, Systems Management Server (SMS), IntelliMirror technology, and the Distributed
File System (Dfs).

Chapter 10, "Network Traffic Testing"—This chapter covers both the preventive and
troubleshooting aspects of network traffic monitoring, as well as tools used to manage the process.
This includes the use of network analyzers, such as the Windows 2000 Network Monitor Tool and
Cisco's TrafficDirector. It covers advanced simulation methods and tools such as COMNET
Predictor, and carefully outlines several different types of tests that you can conduct, including
single- and dual-analyzer captures. In addition, it demonstrates application testing and "what if?"
network simulations. The chapter also walks through the process of creating a topological map of
your network.

Chapter 11, "IP Address and Naming Services"—This chapter covers naming services, including
DNS and DDNS, NetBIOS NBT name services, WINS, and DHCP. It addresses integration of these
services to help provide a comprehensive solution, and discusses other essential solutions such as
forwarding broadcasts on Cisco routers and fault tolerance strategies. It also covers design options
for naming services and overviews of the latest Windows 2000 and Cisco Network Registrar (CNR)
DNS/DHCP tools.

Chapter 12, "Designing Windows 2000 Domains"—This chapter covers the latest information on
Windows 2000 domain design. It presents the subject in a way that helps you make the most of
your Cisco/Windows network. It carefully examines the technical steps required to build new
networks or migrate existing networks to the new Windows 2000 domain model, and addresses
real-world issues such as client migration and namespace design. It also provides several
examples of network designs appropriate for small-, medium-, and enterprise-sized organizations.
Finally, it covers tools such as DirectManage, DirectAdmin, DirectScript, and FastLane's Domain
Management Suite (DM/Suite).

Part IV: Intranet/Extranet Strategies
Now that you have the foundation of building Cisco/Microsoft networks, you can explore specific,
more advanced, connectivity solutions.

Chapter 13, "Web Services"—This chapter covers Web-based technologies offered by Cisco.
Cisco's DistributedDirector, LocalDirector, and Web Cache Engine are all reviewed in detail. The
chapter also discusses Cisco's Web browser interface, which allows the execution of Cisco IOS
commands through a Web browser.

Chapter 14, "Secure Connections"—This chapter covers security hardware and software
solutions from Cisco and Microsoft. It details Cisco IOS access control lists, Cisco Firewall IOS, and
Cisco PIX Firewall, including treatment of the Network Address Translation (NAT) on the router
IOS, on the router Firewall IOS, and on PIX Firewall. In addition, Cisco's real-time intrusion
detection system, NetRanger (recently renamed CiscoSecure Intrusion Detection System), is fully
covered.

Chapter 15, "Ensuring Quality of Service"—This chapter covers the implementations of Quality
of Service (QoS) past, present, and future. It also covers Microsoft's implementation of LDAP with
Active Directory (included with Windows 2000), DCirectory- Enabled Networking (DEN), IP QoS,
and QoS commands in Cisco's IOS operating system.

Chapter 16, "Authentication, Authorization, and Accounting"—This chapter covers
mechanisms you can use to protect against unauthorized access, control legitimate access, and
track detailed information about the who, what, where, and when of access to your network. It
defines the concepts behind Authentication, Authorization, and Accounting (AAA), and discusses
CiscoSecure Access Control Server, NetSonar (recently renamed CiscoSecure Scanner),
TACACS+, RADIUS, and CryptoCards.


Part V: Appendixes
The appendixes contain handy references to help you with router configuration, understanding the
TCP/IP protocol suite, and getting Cisco and Microsoft Certifications. They also provide you
resources for getting all the help and information you need.

Appendix A, "Basic Cisco Router Configuration"—This appendix contains information and tips
on configuring a Cisco router. It contains a step-by-step walkthrough of a simple router
configuration.

Appendix B, "Map of the TCP/IP Protocol Suite"—This appendix contains an excellent
summarization of the TCP/IP protocol suite. It uses helpful descriptions and diagrams to describe
TCP/IP and how it fits into the network.

Appendix C, "The Road to Certification"—This appendix covers all the little details about
3 giai đoạn của con... người, ban đầu dek biết gì thì phải thăm dò, sau đó biết rồi thì phải thân thiết, sau cùng khi quá thân thiết rồi thì phải tình thương mến thương. Nhưng mà không thương được thì ...
[Up] [Print Copy]
[digg] [delicious] [google] [yahoo] [technorati] [reddit] [stumbleupon]
Go to: 
 Users currently in here 
1 Anonymous

Powered by JForum - Extended by HVAOnline
 hvaonline.net  |  hvaforum.net  |  hvazone.net  |  hvanews.net  |  vnhacker.org
1999 - 2013 © v2012|0504|218|